Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the effect of very large nodes in Internet graphs., and . GLOBECOM, page 2624-2628. IEEE, (2002)A most probable path approach to queueing systems with general Gaussian input., and . Comput. Networks, 40 (3): 399-412 (2002)Regular Decomposition of Large Graphs: Foundation of a Sampling Approach to Stochastic Block Model Fitting., , , , and . Data Sci. Eng., 4 (1): 44-60 (2019)The Superposition of Variable Bit Rate Sources in an ATM Multiplexer., , , and . IEEE J. Sel. Areas Commun., 9 (3): 378-387 (1991)Most probable paths and performance formulae for buffers with gaussian input traffic., , and . Eur. Trans. Telecommun., 13 (3): 183-196 (2002)On Uncoordinated File Distribution with Non-altruistic Downloaders., , and . ITC, volume 4516 of Lecture Notes in Computer Science, page 606-617. Springer, (2007)A mean-field approach to some Internet-like random networks.. ITC, page 1-8. IEEE, (2009)A Dependability Case Approach to the Assessment of IP Networks., , and . SECURWARE, page 426-432. IEEE Computer Society, (2008)The Network of Excellence Euro-NF and its Specific Joint Research Projects, , , , and . ICST Global Community Magazine, (2012)A power-law graph as a distributed hash table with quick search and small tables., and . VALUETOOLS, page 28. ICST/ACM, (2009)